Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

SC-900: Microsoft Security, Compliance, & Identity with SIMS

via Udemy

Overview

Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7

What you'll learn:
  • Learn the concepts and perform hands on activities needed to pass the SC-900 exam
  • Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
  • Get loads of hands on experience with securing Microsoft 365 / Azure Services
  • Utilize hands on simulations that can be access anytime, anywhere!

We really hope you'll agree, this training is way more then the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVEREDINCLUDINGHANDSONLECTUREANDPRACTICETUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Having a Solid Foundation of Active Directory Domains

  • Having a Solid Foundation of RAS, DMZ, and Virtualization

  • Having a Solid Foundation of the Microsoft Cloud Services

  • Questions for John Christopher

Performing hands on activities

  • IMPORTANT Using Assignments in the course

  • Creating a free Microsoft 365 Azure AD Account

  • Getting your free Azure credit

Describe security and compliance concepts

  • Describe the shared responsibility model

  • Describe defense in depth

  • Describe the Zero-Trust model

  • Describe encryption and hashing

  • Describe compliance concepts

Define identity concepts

  • Define identity as the primary security perimeter

  • Define authentication

  • Define authorization

  • Describe identity providers and the concept of Federation

  • Describe Active Directory

Describe the basic identity services and identity types of Azure AD

  • Describe Azure AD

  • Describe Azure AD identities including external identities

  • Describe hybrid identity

Describe the authentication capabilities of Azure AD

  • Describe the authentication methods available in Azure AD

  • Describe Multi-factor Authentication

  • Describe self-service password reset

  • Describe password protection and management capabilities available in Azure AD

Describe access management capabilities of Azure AD

  • Describe conditional access

  • Creating conditional access polies

  • Describe the benefits of Azure AD roles

  • Describe the benefits of Azure AD role-based access control

Describe the identity protection and governance capabilities of Azure AD

  • Describe identity governance in Azure AD

  • Describe entitlement management

  • Describe access reviews

  • Describe the capabilities of Azure AD Privileged Identity Management (PIM)

  • Implementing Azure AD Privileged Identity Management (PIM)

  • Describe Azure AD Identity Protection

Describe basic security capabilities in Azure

  • Visualizing general Azure networking

  • Describe Azure DDoS protection

  • Describe Azure Firewall

  • Describe Network Segmentation with VNet

  • Describe Azure Network Security groups

  • Create a virtual machine in Azure

  • Describe Azure Bastion and JIT Access

  • Describe ways Azure encrypts data

Describe security management capabilities of Azure

  • Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)

  • Describe the enhanced security features of Microsoft Defender for Cloud

  • Describe security baselines for Azure

Describe security capabilities of Microsoft Sentinel

  • Define the concepts of security information and event management (SIEM) and SOAR

  • Describe threat detection and mitigation capabilities in Microsoft Sentinel

Describe threat protection with Microsoft 365 Defender

  • Describe Microsoft 365 Defender services

  • Describe Microsoft Defender for Office 365

  • Describe Microsoft Defender for Endpoint

  • Describe Microsoft Defender for Cloud Apps

  • Using Microsoft Defender for Cloud Apps for policy creation

  • Describe Microsoft Defender for Identity

  • Basics of setting up Microsoft Defender for Identity

  • Describe the Microsoft 365 Defender portal

Describe Microsoft’s Service Trust Portal and privacy principles

  • Describe the offerings of the Service Trust portal

  • Describe Microsoft’s privacy principles

Describe the compliance management capabilities of Microsoft Purview

  • Describe the Microsoft Purview compliance portal

  • Describe compliance manager

  • Describe the use and benefits of compliance score

Describe information protection & data lifecycle management of Microsoft Purview

  • Describe data classification capabilities

  • Describe the benefits of content explorer and activity explorer

  • Describe sensitivity labels

  • Basics of using sensitivity labels

  • Describe Data Loss Prevention (DLP)

  • Basics of using Data Loss Prevention (DLP)

  • Describe Records Management

  • Describe Retention Polices and Retention Labels

Describe insider risk capabilities in Microsoft Purview

  • Describe Insider Risk Management

  • Describe communication compliance

  • Describe information barriers

Describe resource governance capabilities in Azure

  • Describe Azure Policy

  • Describe Azure Blueprints

  • Describe the capabilities of the Microsoft Purview governance portal

Finishing Up

  • Where do I go from here?


Taught by

John Christopher

Reviews

4.7 rating at Udemy based on 481 ratings

Start your review of SC-900: Microsoft Security, Compliance, & Identity with SIMS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.